ID | Interpret | Skladba | Album | |
1. | Barbara Laswell | Building Staff Competence in Security - Part 3: Creating a Culture of Security; Actions Leaders Can Take | CERT Podcasts for Business Leaders | |
2. | Barbara Laswell | Building Staff Competence in Security | CERT Podcasts for Business Leaders | |
3. | Barbara Laswell | Building Staff Competence in Security - Part 2: What Skills Should a Hiring Manager Look For? | CERT Podcasts for Business Leaders | |
4. | Barbara Laswell | Building Staff Competence in Security - Part 1: Identify and Match Required Competencies to Roles | CERT Podcasts for Business Leaders | |
5. | Greg Newby | The Human Side of Security Trade-Offs - Part 2: Building a Security Conscious Culture | CERT’s Podcasts for Business Leaders | |
6. | Ed Hensley, Rebecca Kratz | Ed Hensley, Plaintiff, Kentucky's Godly Homeland Security Law & Rebecca Kratz, FFRF Staff Attorney | Freethought Radio | |
7. | Betsy Nichols | Building a Security Metrics Program | CERT’s Podcasts for Business Leaders | |
8. | Betsy Nichols | Building a Security Metrics Program - Part 3: Challenges and Getting Started | CERT’s Podcasts for Business Leaders | |
9. | Betsy Nichols | Building a Security Metrics Program - Part 1: Understand Your Objectives and the Business Context | CERT’s Podcasts for Business Leaders | |
10. | Betsy Nichols | Building a Security Metrics Program - Part 2: Selecting Useful Metrics Based on Risk | CERT’s Podcasts for Business Leaders | |
11. | Julia Allen | Building More Secure Software - Part 1: Software Security Is Just Good Business | CERT's Podcasts for Business Leaders | |
12. | Julia Allen | Building More Secure Software - Part 2: Develop Software with a Security Mind-set | CERT's Podcasts for Business Leaders | |
13. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 3: Building a Risk-Based Compliance Program | CERT’s Podcasts for Business Leaders | |
14. | Dan Duncan | 07 - Christian Competence | 2 Corinthians | |
15. | Thomas S. Bateman | Lessons in Leadership: From Competence to Charisma | Engaging the Mind Podcasts | |
16. | Brooks Jensen, Editor, LensWork Publishing | LW0220 - Commitment as a Means to Fuel Competence | LensWork Podcasts on Photography and the Creative Process | |
17. | by David Mueller | Leading Competence Units A Node of the Austrian Economy | bridges Vol. 12 | |
18. | Steve Gibson with Leo Laporte | Security Now 91: Marc Maiffret of eEye Digital Security - sponsored by Astaro Corp. | Security Now May 2007 | |
19. | Steve Gibson with Leo Laporte | Security Now 91: Marc Maiffret of eEye Digital Security - sponsored by Astaro Corp. | Security Now May 2007 | |
20. | Bruce Cowper | Microsoft Webcast: Security Series : System Security Configuration Though Group Policy | | |
21. | Information Security Media Group | Information Security Media Group - RSA Conference 2007 - Calyptix Security | | |
22. | Information Security Media Group | Information Security Media Group - RSA Conference 2007 - Relational Security | | |
23. | Information Security Media Group | Information Security Media Group - RSA Conference 2007 - Chosen Security | | |
24. | Information Security Media Group | Information Security Media Group - RSA Conference 2007 - eDMZ Security | | |
25. | Julia Allen | Getting Real about Security Governance - Part 3: Making Security a Mainstream Process | CERT’s Podcasts for Business Leaders | |
26. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 1: The Challenges in Defining a Security Vulnerability | CERT's Podcasts for Business Leaders | |
27. | Patty Morrison & Bill Boni | Dual Perspectives: A CIO's and CISO's Take on Security - Part 2: Selling Security and Pinpointing Acceptable Risk | CERT's Podcasts for Business Leaders | |
28. | http://www.mckeay.net | Network Security Podcast - Alex Neihaus Astaro Security | Martin McKeay | |
29. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
30. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |